data hiding


Also found in: Dictionary, Thesaurus, Medical.
Related to data hiding: Data abstraction

data hiding

(1) Secretly embedding data in graphics images and other file types. See steganography.

(2) The result of encapsulation in object-oriented programming. See encapsulation.
Mentioned in ?
References in periodicals archive ?
Detecting the hidden information in the carrier image should not be possible even if the data hiding technique is known.
A relationship of covert communication with the two major data hiding techniques steganography and watermarking is shown in Figure 2.
Conventional approaches to data hiding within images can be categorized into spatial or transform (e.
Encapsulation, or data hiding, required that the internal workings of a module be kept private, so that later changes to the module would not affect other areas of the program.
Data Hiding Fundamentals and Applications: Content Security in Digital Multimedia.
Today's data hiding techniques, such as kernel mode rootkits, are quickly driving professional computer forensics products to becoming a key auditing component of comprehensive IR investigations.
These five companies were among eleven to propose solutions to the Data Hiding Sub Group (DHSG) of the Copyright Protection Technical Working Group (CPTWG) way back in September 1997.
In addition to the above topic, Raggo will speak about data hiding and steganography at PFIC 2011, and provide a peek at the latest innovations.
Abstracts of generally less than half a page are provided for about 150 papers on artificial intelligence applications, image and audio processing applications, networking and wireless communications, information systems and internet technology, energy-efficient systems software testing, software engineering, information security and privacy, model-based software development, circuits and systems, high-performance computing architecture, data mining, computer information technology education, data hiding, human-computer interaction, social computing, and miscellaneous topics.
This phase is achieved through two steps: Data formatting and Data hiding.
Grouped by session, the papers are on topics that include image processing and intelligent control, video coding schemes, cryptanalysis and applications, 3D model retrieval and data hiding, internet and electronic commerce security, and others.
While many steganographic methods have been proposed for various types of cover media in recent years, techniques of steganalysis have also rapidly developed to detect the presence of secret messages based on statistical abnormality caused by data hiding [1, 2].